1 About help 1 .....................................................................................................................................................
2 Installation/Upgrade 2 .................................................................................................................................
2.1 New features in ESET PROTECT 8.0 2 ......................................................................................................
2.2 Architecture 3 ..............................................................................................................................................
2.2.1 Server 4 ....................................................................................................................................................
2.2.2 Web Console 4 ............................................................................................................................................
2.2.3 HTTP Proxy 5 ..............................................................................................................................................
2.2.4 Agent 7 .....................................................................................................................................................
2.2.5 Rogue Detection Sensor 8 ..............................................................................................................................
2.2.6 Mobile Device Connector 9 .............................................................................................................................
2.2.7 Apache HTTP Proxy 10 ..................................................................................................................................
2.3 Differences between Apache HTTP Proxy, Mirror Tool and direct connectivity 14 ..........................
2.3.1 When to start using Apache HTTP Proxy 15 ........................................................................................................
2.3.2 When to start using Mirror Tool 15 ...................................................................................................................
3 System requirements and sizing 16 ....................................................................................................
3.1 Supported Operating Systems 16 ............................................................................................................
3.1.1 Windows 16 ...............................................................................................................................................
3.1.2 Linux 18 ....................................................................................................................................................
3.1.3 macOS 18 .................................................................................................................................................
3.1.4 Mobile 19 ..................................................................................................................................................
3.2 Supported Desktop Provisioning Environments 20 ...............................................................................
3.3 Hardware and infrastructure sizing 21 ...................................................................................................
3.3.1 Deployment recommendations 22 ...................................................................................................................
3.3.2 Deployment for 10,000 clients 24 ....................................................................................................................
3.4 Database 24 .................................................................................................................................................
3.5 Supported versions of Apache Tomcat and Java 26 ..............................................................................
3.6 Supported Web browsers, ESET security products and languages 26 ...............................................
3.7 Network 28 ...................................................................................................................................................
3.7.1 Ports used 29 .............................................................................................................................................
4 Installation process 32 ................................................................................................................................
4.1 All-in-one installation on Windows 33 .....................................................................................................
4.1.1 Install the ESET PROTECT Server 34 .................................................................................................................
4.1.2 Install ESET PROTECT Mobile Device Connector (Standalone) 44 ..............................................................................
4.2 Installation on Microsoft Azure 50 ...........................................................................................................
4.3 Component installation on Windows 50 ..................................................................................................
4.3.1 Server installation 52 ...................................................................................................................................
4.3.1.1 Server prerequisites - Windows 57 .................................................................................................................
4.3.2 Microsoft SQL Server requirements 58 ..............................................................................................................
4.3.3 MySQL Server installation and configuration 58 ...................................................................................................
4.3.4 Dedicated database user account 60 ................................................................................................................
4.3.5 Agent installation 61 ....................................................................................................................................
4.3.5.1 Server-assisted Agent installation 63 .............................................................................................................
4.3.5.2 Offline Agent installation 63 .........................................................................................................................
4.3.5.3 Agent uninstallation and troubleshooting 64 ....................................................................................................
4.3.5.4 ESET Remote Deployment Tool 65 .................................................................................................................
4.3.6 Web Console installation 65 ...........................................................................................................................
4.3.6.1 Install Web Console using the All-in-one installer 65 ...........................................................................................
4.3.6.2 Install Web Console manually 70 ...................................................................................................................
4.3.7 HTTP Proxy installation 71 .............................................................................................................................
4.3.8 RD Sensor installation 72 ..............................................................................................................................
4.3.8.1 RD Sensor prerequisites 72 .........................................................................................................................
4.3.9 Mirror Tool - Windows 73 ...............................................................................................................................
4.3.10 Mobile Device Connector installation 77 ...........................................................................................................
4.3.10.1 Mobile Device Connector prerequisites 79 ......................................................................................................
4.3.10.2 Mobile Device Connector activation 81 ..........................................................................................................